Skip to main content
guest
Join
|
Help
|
Sign In
ACG 6415
Home
guest
|
Join
|
Help
|
Sign In
ACG 6415
Wiki Home
Projects
Recent Changes
Pages and Files
Members
Home
Syllabus - Spring 2018
Schedule - Spring 2018
Class Readings
Class Slides
Access Control Simulation
Course Videos
TYU Solutions
GAO Reports
Security Certifications
Resources
Frameworks & Standards
Threat Statistics
Phishing
Security in the News
Technology Radar
AIS/CPA Exam
Wiki Information
Course Videos
Edit
13
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
Warriors of the Net:
SOC for Cybersecurity
1Password Password Manager:
Fuzzing Explained:
Intypedia Videos:
IntyPedia Introduction to Computer Network Security:
IntyPedia Malware:
IntyPedia Symmetric Key Encryption:
IntyPedia Public Key Encryption:
IntyPedia on SSL
Network Perimeter Security
History of Cryptography
Web Application Security
Link to a series of
Kahn Academy videos on Cryptography
Good Explanation of NAT
Buffer Overflow:
How to prevent data leakage:
Hacking Your Car:
Who are the Hackers
(TED video Playlist)
Digital Certificates:
DigitalCertificates
Active Directory Explanation:
Tutorial: An introduction to Public Key Infrastructure (PKI):
Passwords:
Group Policy Components:
SQL Injection:
SQL Injection and PHP code (this one is long and covers more coding along with SQL Injection example):
Application Security:
RAID:
Securing Against Advanced Cyber Threats
(netflow analysis, netflow behavior analysis (NBA))
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Warriors of the Net:
SOC for Cybersecurity
1Password Password Manager:
Fuzzing Explained:
Intypedia Videos:
IntyPedia Introduction to Computer Network Security:
IntyPedia Malware:
IntyPedia Symmetric Key Encryption:
IntyPedia Public Key Encryption:
IntyPedia on SSL
Network Perimeter Security
History of Cryptography
Web Application Security
Link to a series of Kahn Academy videos on Cryptography
Good Explanation of NAT
Buffer Overflow:
How to prevent data leakage:
Hacking Your Car:
Who are the Hackers (TED video Playlist)
Digital Certificates:
DigitalCertificates
Active Directory Explanation:
Tutorial: An introduction to Public Key Infrastructure (PKI):
Passwords:
Group Policy Components:
SQL Injection:
SQL Injection and PHP code (this one is long and covers more coding along with SQL Injection example):
Application Security:
RAID:
Securing Against Advanced Cyber Threats (netflow analysis, netflow behavior analysis (NBA))